3
What is UMA UMA allows to access the mobile voice and data services of the cellular network over a Wireless LAN Subscribers are enabled to roam and handover between cellular networks and wireless networks UMA Technology specification was published in September 2004 3GPP approved the specification as “Generic Access to A/Gb interfaces” Pilot project by Nokia in Finland

8
UMA Security – EAP Authentication Steps in Authentication ( EAP ) MS establish a link with AP Determines the UNC to be connected Initiate the connection with UNC with IKE UNC connects with the local AAA

9
UMA Security - EAP Authentication (Contd..) Local AAA linked to the Home AAA EAP procedure is performed between MS and AAA UNC is a relay for EAP messages

11
EAP-AKA steps MS finds an AP MS finds the UNC-SGW and initiates the IKEv2 authentication procedure MS sends to NAI to UNC-SGW which contains IMSI UNC-SGW communicates with local AAA Local server determines the Home AAA by using the NAI. Routing path may include several AAA proxies Leading digits in NAI indicates the authentication procedure is EAP - AKA

13
EAP-AKA steps ( contd..) MS runs the UMTS algorithm and verifies the AUTH. It computes the RES, IK, CK and calculates MAC using the generated IK and CK MS sends EAP Response/AKA Challenge with RES and MAC AAA verifies the received MAC and compares RES with XRES AAA sends IK and CK to UNC-SGW for the communication with MS UNC-SGW informs the successful authentication to MS

14
EAP-AKA Fast Re-Authentication Used to reduce the network load due to the authentication AAA server authenticates the user based on the keys derived by the last full authentication Re-authentication ID is generated by the AAA in the full authentication process

16
EAP-AKA Fast Re-Authentication Steps MS initiates the IKEv2 authentication procedure Re-Authentication identity is sent to the UNC-SGW UNC-SGW sends EAP Response/Identity to AAA with re-authentication Id AAA initiates a counter and sends EAP Request/AKA-Reauthentication message with counter value, MAC and re-authentication id for the next fast authentication. MS verifies the counter value and the MAC and send the EAP Response/AKA-Reauthentication with the same counter value and calculated MAC. AAA server verifies the counter value and MAC EAP success message is sent to MS

18
Future Work Calls handing off between the cellular network and the wireless LAN with fast authentication process SSO from one UNC to another Introduce UNC to the Mobile Shopping Mall. UNC can be a web service. Introduce XML security to the communication between MS and UNC Authentication of the UNC to the network Some security holes in Fast authentication